Pypolicyd-spf then tags what has driven the result for later use:
E.g.
Apr 3 11:19:23 emp87 policyd-spf[1336326]: prepend
Authentication-Results: mail.simonandkate.net; spf=pass (mailfrom)
Apr 2 12:32:51 emp87 policyd-spf[1255235]: prepend
Authentication-Results: mail.simonandkate.net; spf=p
On 2021-04-23 11:44, Nick Tait wrote:
On 3/04/21 3:14 pm, Simon Wilson wrote:
Pypolicyd-spf then tags what has driven the result for later use:
E.g.
Apr 3 11:19:23 emp87 policyd-spf[1336326]: prepend
Authentication-Results: mail.simonandkate.net; spf=pass (mailfrom)
Apr 2 12:32:51 emp87 polic
On 3/04/21 3:14 pm, Simon Wilson wrote:
Pypolicyd-spf then tags what has driven the result for later use:
E.g.
Apr 3 11:19:23 emp87 policyd-spf[1336326]: prepend
Authentication-Results: mail.simonandkate.net; spf=pass (mailfrom)
Apr 2 12:32:51 emp87 policyd-spf[1255235]: prepend
Authenticatio
On Sat, 3 Apr 2021, Simon Wilson wrote:
Please read CVE-2019-20790, and tell me you’ve found a way to tell
PyPolicyd not to trust the SMTP HELO to generate a passing AR header.
This is possibly off-topic for the Postfix list... maybe not.
…with tongue in cheek, I’ll take all the discussion
Please read CVE-2019-20790, and tell me you’ve found a way to tell
PyPolicyd not to trust the SMTP HELO to generate a passing AR
header.
This is possibly off-topic for the Postfix list... maybe not.
…with tongue in cheek, I’ll take all the discussion about mail
filtering over any about p
Replied inline and snipped. Apologies if my mail.app gets this wrong.
> On Apr 1, 2021, at 7:49 PM, Simon Wilson wrote:
>
> - Message from Dan Mahoney -
> Date: Thu, 1 Apr 2021 16:19:05 -0700
> From: Dan Mahoney
> Subject: Re: Milters and p
- Message from Dan Mahoney -
Date: Thu, 1 Apr 2021 16:19:05 -0700
From: Dan Mahoney
Subject: Re: Milters and policy
To: si...@simonandkate.net
Cc: postfix-users@postfix.org
On Mar 31, 2021, at 18:23, Simon Wilson wrote:
...if multiple milters are called are
> On Mar 31, 2021, at 18:23, Simon Wilson wrote:
>
>
>>
>>> ...if multiple milters are called are they run in order specified?
>>>
>>> smtpd_milters = inet:127.0.0.1:8891,inet:127.0.0.1:8893
>>
>> yes
>>
>>> I.e. in the example above if OpenDMARC is to see and trust an
>>> alre
...if multiple milters are called are they run in order specified?
smtpd_milters = inet:127.0.0.1:8891,inet:127.0.0.1:8893
yes
I.e. in the example above if OpenDMARC is to see and trust an
already-run OpenDKIM Authentication-Results header is the order of
specifying the milters impo
On 2021-04-01 02:29, Simon Wilson wrote:
...if multiple milters are called are they run in order specified?
smtpd_milters = inet:127.0.0.1:8891,inet:127.0.0.1:8893
yes
I.e. in the example above if OpenDMARC is to see and trust an
already-run OpenDKIM Authentication-Results header
Quick question please:
Which does Postfix run first - a milter specified in smtpd_milters or
a check_policy_service in smtpd_recipient_restrictions?
milters is run after check policy service, to keep performance at top
Thank you sir...
I just found this too which helped:
https://groups.goo
- Message from Benny Pedersen -
Date: Thu, 01 Apr 2021 01:50:15 +0200
From: Benny Pedersen
Subject: Re: Milters and policy
To: postfix-users@postfix.org
On 2021-04-01 01:43, Simon Wilson wrote:
Quick question please:
Which does Postfix run first - a milter specified
On 2021-04-01 01:43, Simon Wilson wrote:
Quick question please:
Which does Postfix run first - a milter specified in smtpd_milters or
a check_policy_service in smtpd_recipient_restrictions?
milters is run after check policy service, to keep performance at top
Quick question please:
Which does Postfix run first - a milter specified in smtpd_milters or
a check_policy_service in smtpd_recipient_restrictions?
I.e.:
#OpenDKIM
smtpd_milters = inet:127.0.0.1:8891
...
smtpd_recipient_restrictions =
...
# python-policyd-spf
check_policy_
14 matches
Mail list logo